sensepost/ruler
o365-exchange-techniques - MISP galaxy
o365-exchange-techniques - Office365/Exchange related techniques by @johnLaTwC and @inversecos
Offensive Security Tool: Ruler - A tool to abuse Exchange & Office ...
Offensive Security Tool: Ruler - A tool to abuse Exchange & Office 365 services Ruler by @Sensepost is a tool that allows you to interact ...
T1137 - Office Application Startup - Atomic Red Team
Microsoft Office is a fairly common application suite on Windows-based operating systems within an enterprise network. There are multiple ...
Hunting for bugs, catching dragons - Black Hat
MIME parsing. HTML / RTF. Pictures (GDI or Office stacks). Fonts. OLE Objects. Calendars, iCals, vCards, contacts. Attachments. TNEF, MAPI properties … Misc.
Password Spraying Outlook Web Access: Remote Shell
This lab looks at an attacking technique called password spraying as well as abusing Outlook Web Application by exploiting mail rules to get a remote shell ...
Rules Contributing to Potentially Malicious Windows Event Alerts
The following rules are used to identify suspicious activity with Windows events. This is a generic rule name. Any one or more of these will trigger ...
Ruler - Getting a shell with Forms - YouTube
A demo of how Ruler is able to create a custom form. This form is able to run custom VBScript and gain RCE when the email is ...
Ruler and Liniaal @ Troopers 17 | PPT | Free Download - SlideShare
Exploiting exchange accounts for persistent command and MAPI/RCP/OutlookAnywhere for control. Presented by Etienne Stalmans @ Troopers 2017
Hacking the Hacker: Assessing and Addressing Your Organization's ...
Victim tricked into executing “stager” trojan horse program, modifies host system. 2. After executing, it immediately downloads.
Check Your Email Rules for Maliciousness - KnowBe4 Blog
When was the last time your anti-malware program or vulnerability scanner warned you about a potentially malicious email rule, add-in, or ...
ATT&CK Technique T1137 – Mappings Explorer - GitHub Pages
T1137 Office Application Startup Mappings. Adversaries may leverage Microsoft Office-based applications for persistence between startups.
Detect and remediate the Outlook rules and custom forms injections ...
Tip. Did you know you can try the features in Microsoft Defender XDR for Office 365 Plan 2 for free? Use the 90-day Defender for Office 365 ...
Breaching the External Network Perimeter with OSINT, Malicious ...
What is Open Source Intelligence (OSINT)?. Open Source Intelligence (OSINT) is a process of gathering information about an entity in a passive.
MITRE ATTCK Техника Домашняя страница Outlook SECURITM
Adversaries may abuse Microsoft Outlook's Home Page feature to obtain persistence on a compromised system. Outlook Home Page is a legacy feature used to ...
Outlook Form/Rule attack cheat sheet - Nhat Truong Blog
Bài viết ngắn gọn cho tấn công Outlook form/rule attack, cách sử dụng công cụ ruler. Nguyên lý của tấn công này là tất cả các rule, ...
README.md - Red Teaming Toolkit - GitLab
数月前,来自印尼雅加达的安全研究员 Rahmat Nurfauzi 曾在 GitHub 上开源过一份「Red Team 安全攻防工具清单」,今天打开一看,没想到已经有 4k+ Star ...
O365 eDiscovery – using wildcards in email addresses
I have an issue with e-discovery project. A customer insistats to use their O365 SEcurity & Complaince environment to do the search.At the same time t...
TR17 Ruler PDF | PDF | Computer Networking - Scribd
TR17_Ruler.pdf - Free download as PDF File (.pdf), Text File (.txt) or read online for free. This document provides an overview of using Microsoft Exchange ...
chg: [o365-exchange-techniques] Persistence kill-chain added (WiP)
misp-galaxy - Clusters and elements to attach to MISP events or attributes (like threat actors)
Attacking the Perimeter Blog: Amass, Subdomain Enumeration
Hackers depend considerably on open-source intelligence (OSINT) derived from publicly available information. In this post we use tesla.com ...